Prospects Newsletter

June 23, 2017
Comments [0]

The DocuSign malware attack that occurred in mid-May is noteworthy because it highlights a go-to tactic popular with cyber criminals at the moment: account takeovers.

Attackers will first steal email data or credentials and then use them to launch highly targeted phishing campaigns. The one-two punch targets anyone with an email address and is becoming increasingly common.

DocuSign confirmed...

Read More
June 21, 2017
Comments [0]

Summer’s here and the time is right for getting hacked or worse, having the contents of your computer held hostage by ransomware. For a couple of carefree and extreme data-consuming months, kids everywhere will be doing whatever they want online even if you’ve tried to control them.

In other words, be very afraid.

... Read More
June 15, 2017
Comments [0]

Your policyholders may not even be aware that their networks are part of the Internet of Things. All it takes is adding any kind of smart device that connects to the internet, such as a baby monitor, TV, virtual assistant, thermostat, security camera or any type of appliance, to their home network. These devices add convenience to our lives—but they are also a convenient way for hackers to gain access to our networks and personal information.

... Read More
June 13, 2017
Comments [0]

More than ever, chief security officers are being held accountable for keeping their business safe. Phishing attacks, data breaches, ransomware and the ever-increasing access by employees to technology and data are driving this accountability. But there’s only so much that technology solutions can do to protect against threats.

What else should organizations do? It turns out that most breaches are the result of an employee...

Read More
June 10, 2017
Comments [0]

Researchers agree—health care is now one of the top three targets for cyber attackers. No matter what type of health care facility you work in—a large research hospital, clinic, regional medical center, health insurance company, or a company that provides business or clinical services for health care—the data you work with is worth millions of dollars on the dark web. And attackers can hold a hospital hostage, almost instantly halt operations, and disrupt critical medical processes.

...

Read More
June 9, 2017
Comments [0]

Vladimir Putin has been far more visible lately with statements on the Russian-U.S. election story. Well-schooled in the art of Russian linguistic vagary, he alternately has said that Russian freelance hackers may have been involved, or that a 3-year-old may have been involved, all with a taunting...

Read More
June 7, 2017
Comments [0]

You may now add Miley Cyrus, Emma Watson and Amanda Seyfried to the pool of celebrities who’ve been hacked and publicly humiliated. No doubt, other high-profile individuals will follow.

It’s a reminder that “high net worth individuals,” or...

Read More
June 7, 2017
Comments [0]

Getting ready for some new summer looks? Start early and look no further than your wallet or handbag. 

We’re all moving so fast that it’s easy to let receipts and other IDs and documentation accumulate. Don’t be a George Costanza with an exploding wallet. Limit what you store in a wallet and handbag. Try to carry only what you need on a daily basis. Keep a record of what you carry in a secure place at home, so that you’ll know what to replace if it is lost or stolen. Be sure to leave...

Read More
June 6, 2017
Comments [0]

As the health care industry continues to digitize, data protection technology has not been able to keep pace. Unfortunately for industry participants, health care has become a top target for state-sponsored and free-agent hackers.

In fact, a study released by Michigan State University in April 2017 found that health care...

Read More
June 1, 2017
Comments [0]

A recent Experian study found that most people still have a lot to learn about the risk of identity theft. The majority of those surveyed felt like they were safe from identity theft, but not for the right reasons. The most popular misconception was that scammers, phishers and identity thieves only target the rich and possibly famous.

In reality, identity thieves target low-hanging fruit. To an identity thief, we’re all Kim...

Read More

Offer 24/7 CyberScout Protection

CyberScout's partnership options help you safeguard the identity and privacy of your policyholders, customers, members and employees. Discover how a customized program can help build brand loyalty, customer retention, and quickly generate long-term recurring revenue.

Get Started